Firewall

EgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using FirewallEgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using Firewall

EgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using Firewall

Network Firewalls acts as a fortification to keep the internal corporate network secure. Many people often think as it is…

2 years ago
10 Best Free Firewall Software – 202410 Best Free Firewall Software – 2024

10 Best Free Firewall Software – 2024

In this article, we have done an depth analysis and listed your top 10 best Free Firewall software that provides…

2 years ago
Sophos Web Appliance Critical Flaw Let Attacker Execute Arbitrary CodeSophos Web Appliance Critical Flaw Let Attacker Execute Arbitrary Code

Sophos Web Appliance Critical Flaw Let Attacker Execute Arbitrary Code

Sophos has released a new security advisory that has fixed 3 of its significant vulnerabilities, allowing threat actors to execute…

2 years ago
<strong>Over 4,000 Internet-facing Sophos Firewalls Vulnerable to Code Injection Attacks</strong><strong>Over 4,000 Internet-facing Sophos Firewalls Vulnerable to Code Injection Attacks</strong>

Over 4,000 Internet-facing Sophos Firewalls Vulnerable to Code Injection Attacks

The Sophos Firewall Webadmin and User Portal HTTP interfaces are vulnerable to unauthenticated and remote code execution, as stated in…

2 years ago
5 Benefits of a Cloud Firewall5 Benefits of a Cloud Firewall

5 Benefits of a Cloud Firewall

Firewalls have been a staple of almost every organization’s security since its inception in the late 80s. A firewall is…

3 years ago
Secure Web Gateway (SWG) – A New Bulletproof Corporate Web Security To Protect Sophisticated Web AttacksSecure Web Gateway (SWG) – A New Bulletproof Corporate Web Security To Protect Sophisticated Web Attacks

Secure Web Gateway (SWG) – A New Bulletproof Corporate Web Security To Protect Sophisticated Web Attacks

The goal of Perimeter 81 from day one has been about providing cost-effective and cloud-based security solutions, such as our…

3 years ago
How Does WAF Help in Zero-day Attacks PreventionHow Does WAF Help in Zero-day Attacks Prevention

How Does WAF Help in Zero-day Attacks Prevention

Zero-day attacks have been a real pain to organizations these days. Due to the unavailability of patches for such attacks,…

4 years ago
Measure your Cloud Security in 5 steps with ProphazeMeasure your Cloud Security in 5 steps with Prophaze

Measure your Cloud Security in 5 steps with Prophaze

Following the latest business trends, are you also planning to take your business to the cloud? If yes, have you…

4 years ago
Hackers Exploit SQL Injection & Code Execution Zero-day Bugs in Sophos FirewallHackers Exploit SQL Injection & Code Execution Zero-day Bugs in Sophos Firewall

Hackers Exploit SQL Injection & Code Execution Zero-day Bugs in Sophos Firewall

Sophos patched a SQL injection flaw with XG Firewall product that exploited by attackers in the wild. Sophos informed about…

5 years ago
Hiding a $200 Tiny Malicious Chips Inside IT Equipment to Gain Stealthy Backdoor AccessHiding a $200 Tiny Malicious Chips Inside IT Equipment to Gain Stealthy Backdoor Access

Hiding a $200 Tiny Malicious Chips Inside IT Equipment to Gain Stealthy Backdoor Access

New research shows how easy to hide a $200 tiny spy Chip inside an IT equipment and to gain backdoor…

5 years ago